Data security using multiple image steganography and hybrid data encryption techniques

R Joshi, AK Bairwa, V Soni… - … for Advancement in …, 2022 - ieeexplore.ieee.org
There are advances in data stealth and forgery with the rise of technology and advances in
data transmission. This arises the need for better and developed methods for data …

Optimization of video steganography with additional compression and encryption

D Arraziqi, ES Haq - … Computing Electronics and Control), 2019 - telkomnika.uad.ac.id
Currently, data such as text, images and video are very important. Therefore, data must be
secured from unauthorized parties. In this paper, we propose a number of security levels …

Image encryption based on advanced encryption standard (aes)

S Saudagar, M Kulkarni, A Giramkar… - … for Advancement in …, 2023 - ieeexplore.ieee.org
With the rapid advancement of electronic and digital data transmission and sharing,
information security, user privacy, and confidentiality are paramount in the data storage and …

An effect image steganography system based on pixels disparity value and secret message compression

MS Mustafa - 2022 - openaccess.altinbas.edu.tr
The first priority in the technology and modern communication is improving an effective and
delicate steganography scheme when considering data hiding. Developing such a scheme …

Hidden data transmission during organizations interaction

AV Nikishova, MY Umnitsyn… - 2019 International Multi …, 2019 - ieeexplore.ieee.org
Data is a valuable resource. So it should be protected. The most vulnerable action on the
data is its transmission. Common approach to data protection during its transmission is …

Using LSB Method For Hiding Hill Encrypted Grayscale And RGB Images In RGB Image

HA Ali, EW Abood, WA Khudhair - Journal of Garmian …, 2019 - jgu.garmian.edu.krd
Availability of data anywhere and ease of access and interception the information in different
forms as text, images, video… etc., create an important issue represented by data security …

Review on safe reversible image data hiding

T Naqash, A Iqbal, SH Shah - 2019 IEEE 9th Annual …, 2019 - ieeexplore.ieee.org
To keep the privacy confidential now a day; two techniques are used to encrypt the image
the 1st one is that encrypts the image through cryptography algorithms key. The other one …

[PDF][PDF] Защита информации во внешних хранилищах данных методом рассечения-разнесения

ГН Шурховецкий - Молодая наука Сибири: электрон. науч. журн, 2020 - mnv.irgups.ru
Сегодня ввиду большого распространения облачных технологий всё больше
физических и юридических лиц пользуются их услугами. Общепринятой практикой в …

Multichannel audio steganography based on MPEG surround using direct sequence spread spectrum

M Tomas, I Elfitri - IOP Conference Series: Materials Science …, 2019 - iopscience.iop.org
Audio steganography is a technique for embedding hidden message on the audio signal.
Several techniques are currently available, proposed as methods to hide secret messages …

Protection of critical information in external data stores using the dissection-separation method

GN Shurkhovetsky - IOP Conference Series: Materials Science …, 2021 - iopscience.iop.org
Today, due to the large spread of cloud technologies, more and more individuals and
businesses use their services. It is common practice in the field of cloud technologies to …